Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Information Security | 4 |
Information Systems | 4 |
Best Practices | 2 |
Crime | 2 |
Elementary Secondary Education | 2 |
Kindergarten | 2 |
Prevention | 2 |
Risk | 2 |
Undergraduate Students | 2 |
Audits (Verification) | 1 |
More ▼ |
Source
Journal of Cybersecurity… | 4 |
Author
A. Renee Staton | 1 |
Bernard Ngalim | 1 |
Cathy Horn | 1 |
Deniz Gurkan | 1 |
Jennifer B. Chauvot | 1 |
Michele Kielty | 1 |
Nicholas, John B. | 1 |
Ramlo, Susan E. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Education Level
Early Childhood Education | 2 |
Elementary Education | 2 |
Elementary Secondary Education | 2 |
Higher Education | 2 |
Kindergarten | 2 |
Postsecondary Education | 2 |
Primary Education | 2 |
Audience
Location
Cameroon | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
Ramlo, Susan E.; Nicholas, John B. – Journal of Cybersecurity Education, Research and Practice, 2020
Cybersecurity is a worldwide issue and concern. Prior studies indicate that many people do not use cybersecurity best practices. Although these prior studies used large-scale surveys or interviews, this study used Q methodology [Q] because Q provides greater insight than Likert-format surveys. In fact, Q was created to scientifically study…
Descriptors: Student Attitudes, Information Security, Best Practices, Computer Security